General
-
Target
a5eae8bf978f7cf98e7f29f888187d4117eae3971ab9d2cfb4c9b5f5874efa04
-
Size
305KB
-
Sample
240424-ppdnkshh43
-
MD5
6e2edd719010f23a135850025b5f6051
-
SHA1
d15c28bf68fd3addf97412364d8757d611f416bd
-
SHA256
a5eae8bf978f7cf98e7f29f888187d4117eae3971ab9d2cfb4c9b5f5874efa04
-
SHA512
be0a023012ff0d59c3b803e73666f0d05f3cbf4e083ffa7a6d0bbd859ed449babbedab5e800aa03295b6cbee1a8162d05d956b0d5205e19062fb678af0db4cf4
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
a5eae8bf978f7cf98e7f29f888187d4117eae3971ab9d2cfb4c9b5f5874efa04.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
a5eae8bf978f7cf98e7f29f888187d4117eae3971ab9d2cfb4c9b5f5874efa04
-
Size
305KB
-
MD5
6e2edd719010f23a135850025b5f6051
-
SHA1
d15c28bf68fd3addf97412364d8757d611f416bd
-
SHA256
a5eae8bf978f7cf98e7f29f888187d4117eae3971ab9d2cfb4c9b5f5874efa04
-
SHA512
be0a023012ff0d59c3b803e73666f0d05f3cbf4e083ffa7a6d0bbd859ed449babbedab5e800aa03295b6cbee1a8162d05d956b0d5205e19062fb678af0db4cf4
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-